CVE-2015-9266

Scores

EPSS

0.790medium79.0%
0%20%40%60%80%100%

Percentile: 79.0%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

The web management interface of Ubiquiti airMAX, airFiber, airGateway and EdgeSwitch XP (formerly TOUGHSwitch) allows an unauthenticated attacker to upload and write arbitrary files using directory traversal techniques. An attacker can exploit this vulnerability to gain root privileges. This vulnerability is fixed in the following product versions (fixes released in July 2015, all prior versions are affected): airMAX AC 7.1.3; airMAX M (and airRouter) 5.6.2 XM/XW/TI, 5.5.11 XM/TI, and 5.5.10u2 XW; airGateway 1.1.5; airFiber AF24/AF24HD 2.2.1, AF5x 3.0.2.1, and AF5 2.2.1; airOS 4 XS2/XS5 4.0.4; and EdgeSwitch XP (formerly TOUGHSwitch) 1.3.2.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-22

Exploits

Exploit ID: 39701

Source: exploitdb

URL: https://www.exploit-db.com/exploits/39701

Vulnerable Software (12)

Type: Configuration

Vendor: *

Product: af5_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ui:af5_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "2.2.1",          "vulnerable": true       ...

Source: nvd

Type: Configuration

Vendor: *

Product: af5x_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ui:af5x_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "3.0.2.1",          "vulnerable": true    ...

Source: nvd

Type: Configuration

Vendor: *

Product: airfiber_af24_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ui:airfiber_af24_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "2.2.1",          "vulnerable": tr...

Source: nvd

Type: Configuration

Vendor: *

Product: airfiber_af24hd_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ui:airfiber_af24hd_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "2.2.1",          "vulnerable": ...

Source: nvd

Type: Configuration

Vendor: *

Product: airgateway_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ui:airgateway_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "1.15",          "vulnerable": true ...

Source: nvd

Type: Configuration

Vendor: *

Product: airmax_ac_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ui:airmax_ac_firmware:7.1.3:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": "O...

Source: nvd

Type: Configuration

Vendor: *

Product: airmax_m_ti_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ui:airmax_m_ti_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "5.6.2",          "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: airmax_m_xm_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ui:airmax_m_xm_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "5.6.2",          "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: airmax_m_xw_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ui:airmax_m_xw_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "5.6.2",          "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: airos_4_xs2

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ubnt:airos_4_xs2:*:*:*:*:*:*:*:*",          "versionEndExcluding": "4.0.4",          "vulnerable": true      ...

Source: nvd

Type: Configuration

Vendor: *

Product: airos_4_xs5

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ubnt:airos_4_xs2:*:*:*:*:*:*:*:*",          "versionEndExcluding": "4.0.4",          "vulnerable": true      ...

Source: nvd

Type: Configuration

Vendor: *

Product: edgeswitch_xp_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:ubnt:edgeswitch_xp_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "1.3.2",          "vulnerable": ...

Source: nvd

End of list